Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

An Investigative Analysis on Information Security

Author : Chandni B Menon 1 Anju Joy 2 Emilda Emmanuel 3 Dr. Vince Paul 4

Date of Publication :7th September 2016

Abstract: In this ultramodern but chaos world everything is at our fingertip. But this globalized village makes the human beings so crooked and selfish. Instead of fair and healthy competitions people started hacking our personal data. Hence the need of hour demands information security at its peak point ensuring Nano safety. Just like survival of the fittest theory human brains prevented the threat with lot of protection mechanisms like AES, DES, Blowfish, Rijndael, etc. This paper summarizes a clear study of these issues.

Reference :

    1. Anurag Kurmi, Sushil Kumar Yadav, Amit Aher “Encryption and Decryption Application Based On Rijndael Algorithm and OTP Subsystem”, International Journal of Scientific Research and Engineering Studies (IJSRES) Volume 1 Issue 5, November 2014.
    2. Aruna Gawde, Sanchit Jain, Mohsin Masani, Sahil Deliwalaa “Securing Computer Device Using Bluetooth technology and One-Time Password”, International Journal of Engineering and Computer Science, Volume 4, April 2015.
    3. A.V.Nadargi, Apurva Dalmiya, Sonali Jadhav, Gajendra Singh Solanki “Study of Securing Computer Folders with Bluetooth”, International Advanced Research Journal in Science, Engineering and TechnologyVol. 2, Issue 2, February 2015.
    4. Nikita Saple, Dhanraj Poojari, Ankita Kesarkar and Alka Srivastava, “Securing Computer Folders using Bluetooth and Rijndael Encryption” published at International Journal of Current Engineering and Technology, Vol.5, No.1. (Feb 2015)
    5. Ms. Shilpa. L. Dhapade, Prof. Nilmani Verma, “Implementation Of A Graphical Based Password For Folder Cryptography”, International Journal of Engineering Research & Technology, Vol.2 - Issue 7. (July - 2013)
    6. Pharaoh Chaka, Hilton Chikwiriro, Clive Nyasondo (2014) “Improving The Windows Password PoliciesUsing Mobile Bluetooth And Rijndael Encryption”, IJCSMC,Vol. 3, Issue.3.
    7. Apoorva Gulhane,Akant Preshin “Improving windows security with Rijndael encryption and Bluetooth” published at IJSTE vol2 issue09 march 2016.
    8. Wankhade S.B., Damani A.G., Desai S.J., Khanapure A.V.(2013), “An Innovative Approach to File Security Using Bluetooth” published at International Journal of Scientific Engineering and Technology Volume No.2, Issue No.5, pp : 417-423 1.
    9. Gurpreet Singh,Supriya “A study of encryption algorithm(RSA,DES,3DES,AES)for information security” published atInternational Journal of Computer Application vol:67,April 2013.
    10. Manju Rani, Dr.Sudesh Kumar“Analysis on different parameters of encryption algorithms for information security” published at International Journal of Advanced Research in Computer Science and software engineering vol:5,issue:8,Aug 2015.
    11. E.Kalaikavitha,Juliana Gnanaselvi “Secure login using encrypted Onetime password(OTP) and mobile based login methodology” published at Internatonal Journal of Engineering and Science vol:2,issue:10,Apr2013
    12. Mr. Amit Kashinath Barate, Mrs.Sunita S. Shinde,Ms. Prajakta Umesh Mohite “Enhancement of Security Using Three Level Authentications ”,International Journal of Engineering and Technical Research(IJETR)ISSN:2321-0869,Volume-2,Issue-8, August2014
    13. Delphin Raj K M,Nancy Victor “A Novel Graphical Password Authentication Mechanism” International Journal of Advanced Research in Computer Science and Software Engineering 4(9), September - 2014, pp. 203- 207 .
    14. Lalu Varghese, Nadiya Mathew, Sumy Saju, Vishnu K Prasad, “3-Level Password Authentication System” International Journal of Recent Development in Engineering and Technology (ISSN 2347 - 6435 (Online) Volume 2, Issue 4, April 2014) 128.
    15. "Folder security using graphical password athentication scheme" by Madhuri Akhand,Ankitha Bijwe , Kajal zade, Karuna Borker international journal for Recent Research in mathematics computer science and information technology vol:2,issue:1,2015.
    16. M Rama Raju, J Purna Prakash, “Protecting data in cloud storage using Blowfish encryption algorithm ad image based One-time password”, Imperial journel of interdisciplinary Research vol:2, Issue:1,2016

    1. Anurag Kurmi, Sushil Kumar Yadav, Amit Aher “Encryption and Decryption Application Based On Rijndael Algorithm and OTP Subsystem”, International Journal of Scientific Research and Engineering Studies (IJSRES) Volume 1 Issue 5, November 2014.
    2. Aruna Gawde, Sanchit Jain, Mohsin Masani, Sahil Deliwalaa “Securing Computer Device Using Bluetooth technology and One-Time Password”, International Journal of Engineering and Computer Science, Volume 4, April 2015.
    3. A.V.Nadargi, Apurva Dalmiya, Sonali Jadhav, Gajendra Singh Solanki “Study of Securing Computer Folders with Bluetooth”, International Advanced Research Journal in Science, Engineering and TechnologyVol. 2, Issue 2, February 2015.
    4. Nikita Saple, Dhanraj Poojari, Ankita Kesarkar and Alka Srivastava, “Securing Computer Folders using Bluetooth and Rijndael Encryption” published at International Journal of Current Engineering and Technology, Vol.5, No.1. (Feb 2015)
    5. Ms. Shilpa. L. Dhapade, Prof. Nilmani Verma, “Implementation Of A Graphical Based Password For Folder Cryptography”, International Journal of Engineering Research & Technology, Vol.2 - Issue 7. (July - 2013)
    6. Pharaoh Chaka, Hilton Chikwiriro, Clive Nyasondo (2014) “Improving The Windows Password PoliciesUsing Mobile Bluetooth And Rijndael Encryption”, IJCSMC,Vol. 3, Issue.3.
    7. Apoorva Gulhane,Akant Preshin “Improving windows security with Rijndael encryption and Bluetooth” published at IJSTE vol2 issue09 march 2016.
    8. Wankhade S.B., Damani A.G., Desai S.J., Khanapure A.V.(2013), “An Innovative Approach to File Security Using Bluetooth” published at International Journal of Scientific Engineering and Technology Volume No.2, Issue No.5, pp : 417-423 1.
    9. Gurpreet Singh,Supriya “A study of encryption algorithm(RSA,DES,3DES,AES)for information security” published atInternational Journal of Computer Application vol:67,April 2013.
    10. Manju Rani, Dr.Sudesh Kumar“Analysis on different parameters of encryption algorithms for information security” published at International Journal of Advanced Research in Computer Science and software engineering vol:5,issue:8,Aug 2015.
    11. E.Kalaikavitha,Juliana Gnanaselvi “Secure login using encrypted Onetime password(OTP) and mobile based login methodology” published at Internatonal Journal of Engineering and Science vol:2,issue:10,Apr2013.
    12. Mr. Amit Kashinath Barate, Mrs.Sunita S. Shinde,Ms. Prajakta Umesh Mohite “Enhancement of Security Using Three Level Authentications ”,International Journal of Engineering and Technical Research(IJETR)ISSN:2321-0869,Volume-2,Issue-8, August2014
    13. Delphin Raj K M,Nancy Victor “A Novel Graphical Password Authentication Mechanism” International Journal of Advanced Research in Computer Science and Software Engineering 4(9), September - 2014, pp. 203- 207 .
    14. Lalu Varghese, Nadiya Mathew, Sumy Saju, Vishnu K Prasad, “3-Level Password Authentication System” International Journal of Recent Development in Engineering and Technology (ISSN 2347 - 6435 (Online) Volume 2, Issue 4, April 2014) 128.
    15. Folder security using graphical password athentication scheme" by Madhuri Akhand,Ankitha Bijwe , Kajal zade, Karuna Borker international journal for Recent Research in mathematics computer science and information technology vol:2,issue:1,2015.
    16. M Rama Raju, J Purna Prakash, “Protecting data in cloud storage using Blowfish encryption algorithm ad image based One-time password”, Imperial journel of interdisciplinary Research vol:2, Issue:1,2016

Recent Article